Lesson 17: Post-Compromise Reality — Lateral Movement and Persistence (Defender View)
Section outline
-
Lesson Overview: This lesson educates students on what happens after an attacker breaches a system – how they move laterally through the network and establish persistence to maintain access. The focus is on recognizing these behaviors so that defenders (even young aspiring defenders!) know what to look for and fix first when cleaning up after or preparing for an incident. The tone stresses that in the age of fast-moving malware and AI-driven attacks, understanding post-compromise tactics is key to outsmarting them. We frame it from the defender perspective: find and fix the weak points that allow movement and persistence, and thereby contain the damage.